SlideShare a Scribd company logo
Information Technology for
Managers
ITM Mod 1 intrduction and short key will help to know
Chapter 1 - Introduction
Definition, Characteristics, Generations, Types of Computer, Application
of Computer in various areas of business.
Computer Organization: Block diagram, Input devices, Processing,
Output devices, Computer memory.
Operating System: Meaning, Functions. Features of Windows OS.
Computer Network: Meaning, Components, Transactional Medias,
Types of Network, Topology, Concept of Virus and Anti-virus
What is a Computer ?
A Computer is an electronic machine that takes input from the user,
processes the given input and generates output in the form of useful
information. A computer accepts input in different forms such as data,
programs and user reply.
Data refers to the raw details that need to be processed to generate
some useful information
Programs refer to the set of instructions that can be executed by the
computer in sequential or non-sequential manner.
Computer is also known by various other names such as data
processing unit, data processor and data processing system.
Evolution of Computers
1. Manual computing devices
Sand Table
Abacus
• Abacus replaced the sand frame
with a wooden frame, the
grooves with wires and the
stones with beads. Abaq
meaning dust in Arabic.
• It is also known as a counting
frame and became popular
among the people in Asia Minor
around 5000 years back.
Napier Bones
• Napier bones was developed
by John Napier in the year
1614.
• This device was specially
designed for the multiplication
and quotient of numbers.
2. Automated Computing Devices
Charles Babbage, a professor of mathematics at
the Cambridge University, made some worthwhile
efforts towards automatic computing. He is also
considered to be the father of modern computer.
In 1812, Charles Babbage decided to automate
the repeated series of steps needed in tabulating
various functions, such as polynomial, logarithmic
and trigonometric.
He named the automatic mechanical computing
machine as difference engine.
In 1823, Babbage made it more automatic by
providing the feature of printing the tabulated
results.
Fundamentals of Computers
Components of a Computer
• Central Processing Unit (CPU) It is the
processor of the computer that is responsible
for controlling and executing instructions in
the computer. It is also known as “brain” of
the computer.
• Monitor It is a screen, which displays
information in visual form, after receiving the
video signals from the computer.
• Keyboard and Mouse These are the devices,
which are used by the computer, for receiving
input from the user.
Characteristics of a Computer
• Speed A computer can solve large and complex problems in few
seconds. The speed of a computer generally depends upon its
hardware configuration.
• Storage capacity A computer can store huge amount of data in its
different storage components in many different formats. The storage
area of a computer system is generally divided into two categories,
main memory and secondary storage.
• Accuracy Calculations in a computer can be carried out with great
accuracy. The accuracy achieved by a computer depends upon its
hardware configuration and the instructions.
• Reliability A computer produces results with no error. Most of the
errors generated in the computer are human errors that are created
by the user itself.
• Versatility Computers are versatile machines. They can perform many
different tasks and can be used for many different purposes.
• Diligence Computers can perform repetitive calculations any number
of times with the same accuracy. Computers do not suffer from
human traits, such as tiredness, fatigue, lack of concentration, etc.
Generations of Computers
Generations of Computers
The generations refer to the phases of improvement made to
different computing devices. The different phases of improvement
made to computing devices resulted in a small, cheap, fast, reliable
and productive computer. The technological development in the
field of computers not only refers to the improvements made to the
hardware technologies, but also the improvements made to the
software technologies.
Generations of Computers
Classification Timeline
First Gen 1940-1956
Second Gen 1956-1963
Third Gen 1964-1971
Fourth Gen 1972-2010
Fifth Gen 2010-Present
1. First Generation (1940-56)
These computers used the vacuum tubes
technology for calculation as well as for storage
and control purposes. These computers were also
known as vacuum tubes or thermionic valves
based machines.
Some of the first gen computers are: UNIVAC,
IBM-701, ENIAC(Electronic Numerical Integrator
and Computer), IBM-650
Vacuum Tube
IBM-701
2. Second Generation(1956-63)
Transistors were used in place of vacuum tubes in building the
basic logic circuits. The transistor was invented by Shockley,
Brattain and Bardeen in 1947 for which they won the Nobel
Prize. Transistors used in second generation computers were
smaller, faster, cheaper and generated less heat than that of
vacuum tubes used in first generation computers.
Some examples are: PDP-8(Digital Equipment Corp), IBM 1401
and IBM 7090
Transistors
3. Third Generation(1964-75)
The major characteristic feature of third generation
computer systems was the use of Integrated Circuits
(ICs). The IC technology was also known as
microelectronics technology. ICs were superior to
vacuum tubes and transistors in terms of cost and
performance. The cost of ICs was very low and the
performance was very high.
ICs are the circuits that combine various electronic
components, such as transistors, resistors, capacitors,
etc. onto a single small silicon chip.
Some examples are: NCR 395, B6500, IBM 370, PDP
11
Integrated Circuits
IBM 370
4. Fourth Generation(1975-89)
The progress in LSI and VLSI technologies led to the
development of microprocessor. The LSI technology
allowed thousands of transistors to be fitted onto
one small silicon chip. VLSI technology allowed
hundreds of thousands of transistors to be fitted
onto a single chip. A microprocessor incorporates
various components of a computer—such as CPU,
memory and Input/Output (I/O) controls—onto a
single chip.
The term Personal Computer (PC) became known to
the people during this era. Introduction of RAM
Intel P4004 microprocessor chip
5. Fifth Generation (1990- Present)
Ultra Large Scale Integration (ULSI) technology that allows almost ten
million electronic components to be fabricated on one small chip.
Development of various portable computers such as laptop, pocket
computer, Personal Digital Assistant (PDA), etc.
Development of servers, Optical disk technology
Types of Computers
1. Personal computer: A small, single-user computer based on a
microprocessor.
2. Workstation: A powerful, single-user computer. A workstation is like a
personal computer, but it has a more powerful microprocessor and, in
general, a higher-quality monitor.
3. Minicomputer: A multi-user computer capable of supporting up to
hundreds of users simultaneously.
4. Mainframe: A powerful multi-user computer capable of supporting
many hundreds or thousands of users simultaneously.
5. Supercomputer: An extremely fast computer that can perform
hundreds of millions of instructions per second.
Hand held devices/PDA
Frontier – Super computer
Work Station Personal Computer Mainframe Computer
Operating systems Market Share
Types of Computer,
1. Personal Computer
- Smallest size computer.
- Easy to use at a lower cost.
- No training is required to use the device.
- Used for basic functions, palm top, Hand-held computer, Notebook computer,
desktop, personal digital assistant
2. Work Stations
It is a single-user computer designed mainly for technical and scientific
applications. The microprocessor is very fast with a large RAM and high-speed
adapters.
-Designed for business and professional use, it is a single-user device with high
performance.
- They are better than the personal computer with a powerful CPU, more storage, and
better-looking graphics.
- Their application is endless as there is a computer available for every expertise field.
- It can multitask between audio, video, animation, editing, etc.
Features
- Multiple Processor Cores
- Error-correcting code RAM
- Redundant Array of Independent Disks (RAID)
- Solid State Drives – fewer chances of physical failure
- Optimized, Higher end GPU
3. Mini Computer
- Its lightweight and can fit in a small space too.
- It is cheaper than the mainframe computers.
- Even with a small size, it is quite fast.
- It has a good battery life and stays charged longer
- The manufacturing firms use it for process control. It collects data and
gives back feedback and fixes any abnormality instantly.
- Small organizations like local hospitals and hotels use it to store and
share data related to their customers/ patients. Data management is
the key function here.
4. Mainframe Computer
These are specifically designed computers for big organizations as they
allow hundreds and thousands of users to use programs
simultaneously. Industries like banking, telecom, with a need to process
high volume data, use mainframe computers.
- It is capable of processing huge amounts of data in seconds.
- It is very durable and can last for 50 years at least with proper installation.
- This can handle large-scale memory management.
- It can distribute the work internally among other processors.
- Very few chances of error and even in the case of one, there is a quick fix.
- The technology inside protects data while exchanging information.
5. Super Computer
The largest and fastest computers are the supercomputers specifically
designed to process huge amounts of data. It is capable of processing
trillions of instructions in a few seconds as it has thousands of
processors interconnected.
Roger Cray developed the first supercomputer in 1976 and since then
it is only used for particular science and engineering applications. This
includes weather forecasts, hospital equipment, nuclear research, etc.
Application of Supercomputers
- It enhances device protection as it can decrypt the passwords for security reasons.
- Animation results are excellent on this computer.
- Nuclear weapons and critical medical tests use them for virtual testing.
- The National Oceanic and Atmospheric Administration uses it for climate patterns and
weather conditions.
- Designs flight simulators for beginner pilots for training.
- Online currency like bitcoin and stocks are largely managed by this computer only.
- Diagnosis of some critical health issues like brain injuries and strokes is done by this
computer.
- It accurately analyses scientific data and explores the solar system and earth
movement.
- It can identify the level of pollutants present in the atmosphere at a particular point in
time.
Application of IT in Business
Application of IT in Business
1. Product development – CAD, CAM, CAE(simulation and testing)
2. Marketing – Text, images, videos, digital marketing
3. Research – R&D, patents, trademarks
4. Data tracking and Storage – MIS team, Data mining, analytics using R,
Python
5. Human Resource Management – Workday, SAP SuccessFactors, Oracle
HRMS
6. Finance – SAP, Oracle, for small business Tally
7. Sales & Distribution – Salesforce, Botree
8. Supply Chain Management – Oracle, SAP
Computer Organization
Computer
Block
Diagram
1. Input unit is the platform from where the raw data is passed into the
computer system. The input can be in any form. For example, the mouse-
clicked input, button-input, keyboard-input, etc. All the input data is
passed from the input unit to the computer’s storage unit.
2. CPU - The CPU is the primary component that processes the input
passed into the computer. It is also called the heart or brain of the
computer. The CPU has two components Arithmetic Logical Unit (ALU)
and Control Unit (CU).
Components of a CPU
Arithmetic Logical Unit (ALU) is the digital circuit that takes these 0s and 1s and
performs the necessary arithmetic operations on it and releases the results as the
output
Control Unit (CU) is like the traffic guy. It controls the instructions flowing in and
out of the CPU. The CU is smart enough to sense that when the CPU’s central
processor needs data and when not. If the data is required then it retrieves it from the
Storage Unit and transfers it into the CPU. The CU converts the data into signals and
passes it into the central processor.
Storage Unit Raw data from the Input unit is saved in the Storage Unit. It is the
place where the data that is to be processed and processed data is stored. The
Storage Unit is further classified into two parts.
• Primary Storage – RAM/ROM
• Secondary Storage – Hard disk
3. Output unit is the place through which the computer system outputs the data.
The output unit is always hardware. The computer screen, speakers, printer, etc. are
the output devices because from these devices users get their processed data.
Computer Networking
Introduction
 The advent of computer and communication
technology have changed our daily life. Observe
the following daily life examples-
 Watching Cable TV
 Cash Withdrawal from ATM
 Sending
 Booking
 Sending
 These services
interconnected
and receiving E-mails
Railway or Air-lines Tickets.
and receiving SMS through Mobile.
are provided by the collection of
communicating devices like
computers, which make Communication Network.
 The communication over network are possible
through transfer of text/picture/audio/video data
through wire or wireless transmission medium.
What is a Network?
 In
as
“A
simplest terms, the network can be defined
–
computer network consists of two or more
connected autonomous computers.”
Why we build a Network?
Sharing Resources:
Primary use of network is to share data and peripherals
among users irrespective of their physical location.

Ex. Sharing database, program files, audio and video
files, printer and scanners etc.
Improved Communication:
A computer network enables reliable, secure and faster

communication between users. It saves our time and
offers easy communication methods. Ex. e-mail, SMS
and MMS etc.
Reduced Communication cost:
Sharing resources also reduces its communication

cost.
large
Using today’s public network we can send a
quantity
network
of data at very
very
low cost. Internet and Mobile
playing a important role in sending and
receiving text, image, audio and video data.
Components of a Network
Sender: A device or a computer that sends the
data.
Receiver: A device or a computer that receives
the data.
Message: Information to be communicated. It
may be text, images, sound or video.
Medium: A transmission medium is a physical
path through which the data flows from sender
to receiver. A cable, fiber-optics or radio waves
can be the medium.
Protocol: A set of rules that govern data
communication. It represents an agreement
between the communicating devices.





Networking Devices
 Networking devices are equipments that allow
receive or transmit data or signal and used
make communication channel.
to
 Some common
 Modem
 Hub
 Switch
 Router
 Bridge
 Gateway
 Repeater
Networking devices are-
1. MODEM
A MODEM (MOdulator-DEModulator) is a device that

connect Telephone line to Computer.
It converts Digital signal into Analog (Modulation) and
Analog to Digital (Demodulation). This conversion is
required because Telephone lines can’t carry digital data

Generally it is used to connect a PC with Telephone

lines to access Internet or make voice call and FAX
using PC.
It may Internal or External type. Now days DSL Modem
is used to access Broadband Internet.

2. Hub & Repeater
 A Hub or Concentrator is a connecting device which
connects multiple computers together to form a LAN.
 It provides various RJ-45 ports to connect Twisted Pair cable
in STAR topology and making them act as a single network
segment.
 Hubs make Broadcast type Network and do not manage
traffic that comes through them. Signal entering any port is
broadcast out on all other ports.
 Type of Hub
 Active Hub:
Amplify the signal
works
when
required and as a
Repeater.
 Passive Hub:
It simply passes the signal
without any change.
3. Bridges
 Bridges are used to connect two LAN or two segment of
the same LAN or divide a large network into smaller
segments. Connecting LANs must have the same Protocol.
 Unlike repeaters, bridges contain logic that allows them to
keep traffic for each segment separate. This way bridges
provide some security to the individual segments.
 When a data frame enters a bridge, it not only regenerates
the signal but also checks its destination and forwards only
to the segment to which the address belongs.
4. Switch
Switch is a device that is used to segment network into
different Sub-networks (Subnet) to control the network traffic.
It provides bridging functionality with greater efficiency.
It is responsible for filtering data in a specific way and for
forwarding packets between LAN segments.
A switch has a buffer that stores the packets from the sender
and checks the address to find out the outgoing link. If the
outgoing link is free the switch sends the packet to the
particular link.
Modern day switches are equipped with Router functionalities
and offers faster throughput than Hubs.




5. Router
Router is a networking device which connect multiple
Networks irrespective of their Protocols.
Routers works at IP Address where as Bridge works at MAC
address.
Routers have the intelligence to determine the best possible
route for data packets to travel. There are a number of
routers present in large network to aid in speedy delivery of
data packets.
Router maintains a table of addresses (called routing table)
that keeps a track of delivery paths of data packets.




6. Gateways
A Gateway is a device that
connects dissimilar networks. It
establishes connection between
LAN and External Network with
different structure.
A Gateway is a protocol converter
that connects two dissimilar
networks having different
protocols i.e. It can accept a
packet formatted for one protocol
(e.g. AppleTalk) and convert it to
a packet formatted for another
protocol (e.g. TCP/IP) before
forwarding it.
A gateway can be implemented in
hardware, software or both, but
they are usually implemented by
software installed within a router.
A LAN gets connected to Internet
(WAN) using a gateway.




Networking
• Computer network A collection of computing devices that are
connected in various ways in order to communicate and share
resources
Usually, the connections between computers in a network are made
using physical wires or cables
However, some connections are wireless, using radio waves or infrared
signals
15-52
Networking
• The generic term node or host refers to any device on a network
• Data transfer rate The speed with which data is moved from one
place on a network to another
• Data transfer rate is a key issue in computer networks
15-53
Networking
• Computer networks have opened up an entire
frontier in the world of computing called the
client/server model
15-54
Figure 15.1 Client/Server interaction
Networking
• File server A computer that stores and manages files for multiple
users on a network
• Web server A computer dedicated to responding to requests (from
the browser client) for web pages
15-55
Types of Networks
• Local-area network (LAN) A network that connects a relatively small
number of machines in a relatively close geographical area
15-56
Types of Networks
• Various configurations, called topologies, have been used to
administer LANs
• Ring topology A configuration that connects all nodes in a closed loop on
which messages travel in one direction
• Star topology A configuration that centers around one node to which all
others are connected and through which all messages are sent
• Bus topology All nodes are connected to a single communication line that
carries messages in both directions
15-57
Types of Networks
• A bus technology called Ethernet has become the industry
standard for local-area networks
Figure 15.2 Various network topologies
15-10
Types of Networks
• Wide-area network (WAN) A network that connects two or more
local-area networks over a potentially large geographic distance
Often one particular node on a LAN is set up to serve as a gateway to handle
all communication going between that LAN and other networks
Communication between networks is called internetworking
The Internet, as we know it today, is essentially the ultimate wide-area
network, spanning the entire globe
15-59
Types of Networks
• Metropolitan-area network (MAN) The
communication infrastructures that have been
developed in and around large cities
15-60
So, who owns the Internet?
Well, nobody does. No single person or company owns the Internet or
even controls it entirely. As a wide-area network, it is made up of
many smaller networks. These smaller networks are often owned and
managed by a person or organization. The Internet, then, is really
defined by how connections can be made between these networks.
15-61
Types of Networks
15-62
Figure 15.1 Local-area networks connected across a distance to
create a wide-area network
Internet Connections
• Internet backbone A set of high-speed networks that carry Internet
traffic
These networks are provided by companies such as AT&T, GTE, and
IBM
• Internet service provider (ISP) A company that provides other
companies or individuals with access to the Internet
15-63
Internet Connections
• There are various technologies available that you can use to connect a home
computer to the Internet
• A phone modem converts computer data into an analog audio signal for transfer over a
telephone line, and then a modem at the destination converts it back again into data
• A digital subscriber line (DSL) uses regular copper phone lines to transfer digital data to
and from the phone company’s central office
• A cable modem uses the same line that your cable TV signals come in on to transfer the
data back and forth
15-64
Internet Connections
• Broadband A connection in which transfer speeds are faster than 128
bits per second
• DSL connections and cable modems are broadband connections
• The speed for downloads (getting data from the Internet to your home
computer) may not be the same as uploads (sending data from your home
computer to the Internet)
15-65
Packet Switching
• To improve the efficiency of transferring information over a
shared communication line, messages are divided into fixed-
sized, numbered packets
• Network devices called routers are used to direct packets
between networks
Figure 15.4
Messages
sent by
packet
switching
15-18
Open Systems
• Proprietary system A system that uses technologies kept private by a
particular commercial vendor
One system couldn’t communicate with another, leading to the need for
• Interoperability The ability of software and hardware on multiple
machines and from multiple commercial vendors to communicate
Leading to
• Open systems Systems based on a common model of network
architecture and a suite of protocols used in its implementation
15-67
Open Systems
• The International
Organization for
Standardization (ISO)
established the Open
Systems Interconnection
(OSI) Reference Model
• Each layer deals with a
particular aspect of
network communication
15-68
Figure 15.5 The layers of the OSI Reference Model
Network Protocols
• Network protocols are layered such that each one
relies on the protocols that underlie it
• Sometimes referred to as a protocol stack
15-69
Figure 15.6 Layering of key network protocols
TCP/IP
• TCP stands for Transmission Control Protocol
TCP software breaks messages into packets, hands them off to the IP software
for delivery, and then orders and reassembles the packets at their destination
• IP stands for Internet Protocol
IP software deals with the routing of packets through the maze of
interconnected networks to their final destination
15-70
TCP/IP (cont.)
• UDP stands for User Datagram Protocol
• It is an alternative to TCP
• The main difference is that TCP is highly reliable, at the cost of decreased
performance, while UDP is less reliable, but generally faster
15-71
High-Level Protocols
• Other protocols build on the foundation established by the TCP/IP
protocol suite
• Simple Mail Transfer Protocol (SMTP)
• File Transfer Protocol (FTP)
• Telnet
• Hyper Text Transfer Protocol (http)
15-72
MIME Types
• Related to the idea of network protocols and standardization is the
concept of a file’s MIME type
• MIME stands for Multipurpose Internet Mail Extension
• Based on a document’s MIME type, an application program can decide how to
deal with the data it is given
15-73
MIME Types
15-74
Figure 15.7
Some protocols
and the ports
they use
Firewalls
• Firewall A machine and its software that serve as a special gateway
to a network, protecting it from inappropriate access
• Filters the network traffic that comes in, checking the validity of the messages
as much as possible and perhaps denying some messages altogether
• Enforces an organization’s access control policy
15-75
Firewalls
15-76
Figure 15.8 A firewall protecting a LAN
Network Addresses
• Hostname A unique identification that specifies a particular
computer on the Internet
For example
matisse.csc.villanova.edu
condor.develocorp.com
15-77
Network Addresses
• Network software translates a hostname into its corresponding IP
address
For example
205.39.145.18
15-78
Network Addresses
• An IP address can be split into
• network address, which specifies a specific network
• host number, which specifies a particular machine in that network
15-79
Figure 15.9
An IP address is
stored in four
bytes
Domain Name System
• A hostname consists of the computer name followed by the domain
name
• csc.villanova.edu is the domain name
• A domain name is separated into two or more sections that specify the
organization, and possibly a subset of an organization, of which the computer
is a part
• Two organizations can have a computer named the same thing because the
domain name makes it clear which one is being referred to
15-80
Domain Name System
• The very last section of the domain is called its top-
level domain (TLD) name
15-81
Figure 15.10 Top-level domains, including some relatively new ones
Domain Name System
• Organizations based in countries other than the United States use a
top-level domain that corresponds to their two-letter country codes
15-82
Figure 15.11
Some of the top-level domain
names based on country codes
Domain Name System
• The domain name system (DNS) is chiefly used to translate
hostnames into numeric IP addresses
• DNS is an example of a distributed database
• If that server can resolve the hostname, it does so
• If not, that server asks another domain name server
15-83
Virus and
Antivirus
Table Contents
• Virus
• What does a computer virus do?
• How does a computer get a virus?
• Symptoms of computer virus
• Examples of a computer virus
• Computer Virus Protection
• Antivirus
• Common AntiVirus
• How AntiVirus Works?
• Conclusion
85
Virus
– A computer virus is a program which can harm our
device and files and infect them for no further use.
When a virus program is executed, it replicates
itself by modifying other computer programs and
instead enters its own coding. This code infects a
file or program and if it spreads massively, it may
ultimately result in crashing of the device.
– Across the world, Computer viruses are a great
issue of concern as they can cause billions of
dollars’ worth harm to the economy each year.
86
Virus
87
• Some computer viruses are programmed to harm your
computer by damaging programs, deleting files, or
reformatting the hard drive. Others simply replicate
themselves or flood a network with traffic, making it
impossible to perform any internet activity.
• Even less harmful computer viruses can significantly
disrupt your system’s performance, sapping computer
memory and causing frequent computer crashes.
●●●
88
What does a computer virus do?
• In 2013, the botnet virus Gameover ZueS was
discovered to use peer-to-peer downloading sites to
distribute ransomware and commit banking fraud.
• While tens of thousands of computer viruses still roam
the internet, they have diversified their methods and
are now joined by a number of malware variants like
worms, Trojans, and ransomware.
89
What does a computer virus do?
• Sharing music, files, or photos with other users
• Visiting an infected website
• Opening spam email or an email attachment
• Downloading free games, toolbars, media players and other
system utilities
• Installing mainstream software applications without
thoroughly reading license agreements
90
How does a computer get a virus?
Symptoms of a computer virus
• Slow computer performance
• Erratic computer behavior
• Unexplained data loss
• Frequent computer crashes
91
Examples of computer viruses
•Worms - A worm is a type of virus that, unlike traditional
viruses, usually does not require the action of a user to spread
from device to device.
•Trojans - As in the myth, a Trojan is a virus that hides within
a legitimate-seeming program to spread itself across networks
or devices.
•Ransomware - Ransomware is a type of malware that
encrypts a user’s files and demands a ransom for its return.
Ransomware can be, but isn’t necessarily, spread through
computer viruses.
●●●
92
Computer virus protection
•Use antivirus protection and a firewall
•Get antispyware software
•Always keep your antivirus protection and
antispyware software up-to-date
•Update your operating system regularly
•Increase your browser security settings
●●●
93
Computer virus protection
•Avoid questionable Websites
•Only download software from sites you trust.
•Carefully evaluate free software and file-sharing
applications before downloading them.
•Don't open messages from unknown senders
•Immediately delete messages you suspect to be spam
94
AntiVirus
– An anti-virus is a software which comprises
programs or set of programs which can detect
and remove all the harmful and malicious
software from your device.
– This anti-virus software is designed in a
manner that they can search through the files in
a computer and determine the files which are
heavy or mildly infected by a virus.
95
Common AntiVirus
• Norton Antivirus
• F-Secure Antivirus
• Kaspersky Antivirus
• AVAST Antivirus
• Comodo Antivirus
• McAfee Antivirus
●●●
96
Common AntiVirus
●●●
97
How does an Anti-Virus works?
• Once the file is quarantined, the application can attempt to
repair it, delete it, or prompt you for a decision on what to
do about the file infected.
• This approach helps protect against unidentified or
encrypted viruses and can alert you to suspicious behavior
happening on your computer.
• This interesting is an area where anti-spyware/anti-adware
and anti-virus software often notice the same kinds of
activities, because they are typical for adware and spyware
as well as malware
98
Conclusion
•Computer virus is a software program written with
malicious intentions. There are number
of computer viruses that can impede the functioning of
your computer system.
•They are replicated by themselves. Viruses are so
dangerous and malicious that they can be automatically
copied and pasted from memory to memory over and
over; the transmitting power is too much quick from
network to network that can simply hang smoothly
running
99
References
• Google.com
• Wikipedia.org
• Studymafia.org
• Slidespanda.com
• (2) Word: Getting Started - YouTube
• (2) Word: Creating and Opening Documents - YouTube
(2) Word: Saving and Sharing Documents - YouTube
• (2) Word: Text Basics - YouTube
• (14) Mail Merge in MS Word|step by step process|how to create Mail
Marge document in ms word - YouTube
ITM Mod 1 intrduction and short key will help to know

More Related Content

PDF
Digital Fluency
PDF
Problem Solving Using Computers FOR any dep't
PPTX
Atharva Patil_28_9th lilies_Computer Project2.pptx
PPTX
Computer types and generations of computer.pptx
PDF
Material.pdf
PDF
Elementary Computer Education BED 4TH SEM .pdf
PPTX
Information Technology for Managers - Basics
PPTX
computer applicationin hospitality Industry1 periyar university unit1
Digital Fluency
Problem Solving Using Computers FOR any dep't
Atharva Patil_28_9th lilies_Computer Project2.pptx
Computer types and generations of computer.pptx
Material.pdf
Elementary Computer Education BED 4TH SEM .pdf
Information Technology for Managers - Basics
computer applicationin hospitality Industry1 periyar university unit1

Similar to ITM Mod 1 intrduction and short key will help to know (20)

PPTX
computer application in hospitality Industry, periyar university unit 1
PPTX
PPTX
PPTX
PDF
Application of computer in Hospitality
DOCX
Computer new
PPTX
Computer System Architecture INTRODUCTION
PPTX
Presentation on computer generation
DOCX
What is a computer
PPTX
Module 1.pptx
DOCX
Computer concepts- Mohammadali & Tausif
PPTX
Computer Organization Unit-I Osmania University
DOCX
Tm 1st mod
PPTX
Generation of computer
PPTX
Evolution and classification of computers
PDF
Computer Fundamentals
PPTX
Computer Science PowerPoint Presentation
PDF
Computer organization
PDF
Compendium for computer application
PPT
The Deal
computer application in hospitality Industry, periyar university unit 1
Application of computer in Hospitality
Computer new
Computer System Architecture INTRODUCTION
Presentation on computer generation
What is a computer
Module 1.pptx
Computer concepts- Mohammadali & Tausif
Computer Organization Unit-I Osmania University
Tm 1st mod
Generation of computer
Evolution and classification of computers
Computer Fundamentals
Computer Science PowerPoint Presentation
Computer organization
Compendium for computer application
The Deal
Ad

More from jaya315652 (20)

PDF
samp notes.pdf meaning of risk and return
PPT
HRM.ppt meaning and introudction and functions
PPTX
unit-4.pptx inventory management and its various types of it
PPTX
U-4 Org BM.pptx introduction types and breakdown
PPTX
BM-U-5-6.pptx meaning directing colloing
PPTX
Isoquant (1).pptx introudction meaning and properties
PPTX
Isoquant (1).pptx its meanign and importance
PPTX
module 3.pptx demand and supply introduction
PPTX
meunit-4directingandcontrolling-170328064927.pptx
PPTX
Demand-forcasting.pptx introduction meaning
PDF
Bl.pdf intorudcation and meaning its impact of economics
PPTX
POM Presentation Group 2 introudction of POM
PPT
BCom-Sem1-Indian-Contract-Act-Presentation.ppt
PPTX
BE-U-1.pptx introducation and its impact of business
PPTX
Environment Protection Act and Key Rules(1).pptx
PDF
environmental types its impact on it busness
PDF
Unit3-presentation-POM meaning and types of material handling
PPTX
Contract Act. meaning and forms and its types of it
PPTX
Unit-1 val ed.human values prinicples and videos help to understand
PPTX
principles-of-management meaning and its process
samp notes.pdf meaning of risk and return
HRM.ppt meaning and introudction and functions
unit-4.pptx inventory management and its various types of it
U-4 Org BM.pptx introduction types and breakdown
BM-U-5-6.pptx meaning directing colloing
Isoquant (1).pptx introudction meaning and properties
Isoquant (1).pptx its meanign and importance
module 3.pptx demand and supply introduction
meunit-4directingandcontrolling-170328064927.pptx
Demand-forcasting.pptx introduction meaning
Bl.pdf intorudcation and meaning its impact of economics
POM Presentation Group 2 introudction of POM
BCom-Sem1-Indian-Contract-Act-Presentation.ppt
BE-U-1.pptx introducation and its impact of business
Environment Protection Act and Key Rules(1).pptx
environmental types its impact on it busness
Unit3-presentation-POM meaning and types of material handling
Contract Act. meaning and forms and its types of it
Unit-1 val ed.human values prinicples and videos help to understand
principles-of-management meaning and its process
Ad

Recently uploaded (20)

PPTX
ANATOMY OF ANTERIOR CHAMBER ANGLE AND GONIOSCOPY.pptx
PPTX
6- Architecture design complete (1).pptx
PDF
Wio LTE JP Version v1.3b- 4G, Cat.1, Espruino Compatible\202001935, PCBA;Wio ...
PPTX
building Planning Overview for step wise design.pptx
PPT
Package Design Design Kit 20100009 PWM IC by Bee Technologies
PDF
YOW2022-BNE-MinimalViableArchitecture.pdf
PDF
High-frequency high-voltage transformer outline drawing
PPTX
YV PROFILE PROJECTS PROFILE PRES. DESIGN
PDF
Phone away, tabs closed: No multitasking
PDF
Urban Design Final Project-Site Analysis
PPTX
Causes of Flooding by Slidesgo sdnl;asnjdl;asj.pptx
PPTX
Implications Existing phase plan and its feasibility.pptx
PPTX
AC-Unit1.pptx CRYPTOGRAPHIC NNNNFOR ALL
PDF
Quality Control Management for RMG, Level- 4, Certificate
PPT
Machine printing techniques and plangi dyeing
PDF
SEVA- Fashion designing-Presentation.pdf
PDF
Africa 2025 - Prospects and Challenges first edition.pdf
PDF
The Advantages of Working With a Design-Build Studio
PDF
Facade & Landscape Lighting Techniques and Trends.pptx.pdf
PDF
Emailing DDDX-MBCaEiB.pdf DDD_Europe_2022_Intro_to_Context_Mapping_pdf-165590...
ANATOMY OF ANTERIOR CHAMBER ANGLE AND GONIOSCOPY.pptx
6- Architecture design complete (1).pptx
Wio LTE JP Version v1.3b- 4G, Cat.1, Espruino Compatible\202001935, PCBA;Wio ...
building Planning Overview for step wise design.pptx
Package Design Design Kit 20100009 PWM IC by Bee Technologies
YOW2022-BNE-MinimalViableArchitecture.pdf
High-frequency high-voltage transformer outline drawing
YV PROFILE PROJECTS PROFILE PRES. DESIGN
Phone away, tabs closed: No multitasking
Urban Design Final Project-Site Analysis
Causes of Flooding by Slidesgo sdnl;asnjdl;asj.pptx
Implications Existing phase plan and its feasibility.pptx
AC-Unit1.pptx CRYPTOGRAPHIC NNNNFOR ALL
Quality Control Management for RMG, Level- 4, Certificate
Machine printing techniques and plangi dyeing
SEVA- Fashion designing-Presentation.pdf
Africa 2025 - Prospects and Challenges first edition.pdf
The Advantages of Working With a Design-Build Studio
Facade & Landscape Lighting Techniques and Trends.pptx.pdf
Emailing DDDX-MBCaEiB.pdf DDD_Europe_2022_Intro_to_Context_Mapping_pdf-165590...

ITM Mod 1 intrduction and short key will help to know

  • 3. Chapter 1 - Introduction Definition, Characteristics, Generations, Types of Computer, Application of Computer in various areas of business. Computer Organization: Block diagram, Input devices, Processing, Output devices, Computer memory. Operating System: Meaning, Functions. Features of Windows OS. Computer Network: Meaning, Components, Transactional Medias, Types of Network, Topology, Concept of Virus and Anti-virus
  • 4. What is a Computer ? A Computer is an electronic machine that takes input from the user, processes the given input and generates output in the form of useful information. A computer accepts input in different forms such as data, programs and user reply. Data refers to the raw details that need to be processed to generate some useful information Programs refer to the set of instructions that can be executed by the computer in sequential or non-sequential manner. Computer is also known by various other names such as data processing unit, data processor and data processing system.
  • 6. 1. Manual computing devices Sand Table
  • 7. Abacus • Abacus replaced the sand frame with a wooden frame, the grooves with wires and the stones with beads. Abaq meaning dust in Arabic. • It is also known as a counting frame and became popular among the people in Asia Minor around 5000 years back.
  • 8. Napier Bones • Napier bones was developed by John Napier in the year 1614. • This device was specially designed for the multiplication and quotient of numbers.
  • 9. 2. Automated Computing Devices Charles Babbage, a professor of mathematics at the Cambridge University, made some worthwhile efforts towards automatic computing. He is also considered to be the father of modern computer. In 1812, Charles Babbage decided to automate the repeated series of steps needed in tabulating various functions, such as polynomial, logarithmic and trigonometric. He named the automatic mechanical computing machine as difference engine. In 1823, Babbage made it more automatic by providing the feature of printing the tabulated results.
  • 11. Components of a Computer • Central Processing Unit (CPU) It is the processor of the computer that is responsible for controlling and executing instructions in the computer. It is also known as “brain” of the computer. • Monitor It is a screen, which displays information in visual form, after receiving the video signals from the computer. • Keyboard and Mouse These are the devices, which are used by the computer, for receiving input from the user.
  • 12. Characteristics of a Computer • Speed A computer can solve large and complex problems in few seconds. The speed of a computer generally depends upon its hardware configuration. • Storage capacity A computer can store huge amount of data in its different storage components in many different formats. The storage area of a computer system is generally divided into two categories, main memory and secondary storage. • Accuracy Calculations in a computer can be carried out with great accuracy. The accuracy achieved by a computer depends upon its hardware configuration and the instructions.
  • 13. • Reliability A computer produces results with no error. Most of the errors generated in the computer are human errors that are created by the user itself. • Versatility Computers are versatile machines. They can perform many different tasks and can be used for many different purposes. • Diligence Computers can perform repetitive calculations any number of times with the same accuracy. Computers do not suffer from human traits, such as tiredness, fatigue, lack of concentration, etc.
  • 15. Generations of Computers The generations refer to the phases of improvement made to different computing devices. The different phases of improvement made to computing devices resulted in a small, cheap, fast, reliable and productive computer. The technological development in the field of computers not only refers to the improvements made to the hardware technologies, but also the improvements made to the software technologies.
  • 16. Generations of Computers Classification Timeline First Gen 1940-1956 Second Gen 1956-1963 Third Gen 1964-1971 Fourth Gen 1972-2010 Fifth Gen 2010-Present
  • 17. 1. First Generation (1940-56) These computers used the vacuum tubes technology for calculation as well as for storage and control purposes. These computers were also known as vacuum tubes or thermionic valves based machines. Some of the first gen computers are: UNIVAC, IBM-701, ENIAC(Electronic Numerical Integrator and Computer), IBM-650 Vacuum Tube IBM-701
  • 18. 2. Second Generation(1956-63) Transistors were used in place of vacuum tubes in building the basic logic circuits. The transistor was invented by Shockley, Brattain and Bardeen in 1947 for which they won the Nobel Prize. Transistors used in second generation computers were smaller, faster, cheaper and generated less heat than that of vacuum tubes used in first generation computers. Some examples are: PDP-8(Digital Equipment Corp), IBM 1401 and IBM 7090 Transistors
  • 19. 3. Third Generation(1964-75) The major characteristic feature of third generation computer systems was the use of Integrated Circuits (ICs). The IC technology was also known as microelectronics technology. ICs were superior to vacuum tubes and transistors in terms of cost and performance. The cost of ICs was very low and the performance was very high. ICs are the circuits that combine various electronic components, such as transistors, resistors, capacitors, etc. onto a single small silicon chip. Some examples are: NCR 395, B6500, IBM 370, PDP 11 Integrated Circuits IBM 370
  • 20. 4. Fourth Generation(1975-89) The progress in LSI and VLSI technologies led to the development of microprocessor. The LSI technology allowed thousands of transistors to be fitted onto one small silicon chip. VLSI technology allowed hundreds of thousands of transistors to be fitted onto a single chip. A microprocessor incorporates various components of a computer—such as CPU, memory and Input/Output (I/O) controls—onto a single chip. The term Personal Computer (PC) became known to the people during this era. Introduction of RAM Intel P4004 microprocessor chip
  • 21. 5. Fifth Generation (1990- Present) Ultra Large Scale Integration (ULSI) technology that allows almost ten million electronic components to be fabricated on one small chip. Development of various portable computers such as laptop, pocket computer, Personal Digital Assistant (PDA), etc. Development of servers, Optical disk technology
  • 23. 1. Personal computer: A small, single-user computer based on a microprocessor. 2. Workstation: A powerful, single-user computer. A workstation is like a personal computer, but it has a more powerful microprocessor and, in general, a higher-quality monitor. 3. Minicomputer: A multi-user computer capable of supporting up to hundreds of users simultaneously. 4. Mainframe: A powerful multi-user computer capable of supporting many hundreds or thousands of users simultaneously. 5. Supercomputer: An extremely fast computer that can perform hundreds of millions of instructions per second.
  • 24. Hand held devices/PDA Frontier – Super computer Work Station Personal Computer Mainframe Computer
  • 26. Types of Computer, 1. Personal Computer - Smallest size computer. - Easy to use at a lower cost. - No training is required to use the device. - Used for basic functions, palm top, Hand-held computer, Notebook computer, desktop, personal digital assistant
  • 27. 2. Work Stations It is a single-user computer designed mainly for technical and scientific applications. The microprocessor is very fast with a large RAM and high-speed adapters. -Designed for business and professional use, it is a single-user device with high performance. - They are better than the personal computer with a powerful CPU, more storage, and better-looking graphics. - Their application is endless as there is a computer available for every expertise field. - It can multitask between audio, video, animation, editing, etc. Features - Multiple Processor Cores - Error-correcting code RAM - Redundant Array of Independent Disks (RAID) - Solid State Drives – fewer chances of physical failure - Optimized, Higher end GPU
  • 28. 3. Mini Computer - Its lightweight and can fit in a small space too. - It is cheaper than the mainframe computers. - Even with a small size, it is quite fast. - It has a good battery life and stays charged longer - The manufacturing firms use it for process control. It collects data and gives back feedback and fixes any abnormality instantly. - Small organizations like local hospitals and hotels use it to store and share data related to their customers/ patients. Data management is the key function here.
  • 29. 4. Mainframe Computer These are specifically designed computers for big organizations as they allow hundreds and thousands of users to use programs simultaneously. Industries like banking, telecom, with a need to process high volume data, use mainframe computers. - It is capable of processing huge amounts of data in seconds. - It is very durable and can last for 50 years at least with proper installation. - This can handle large-scale memory management. - It can distribute the work internally among other processors. - Very few chances of error and even in the case of one, there is a quick fix. - The technology inside protects data while exchanging information.
  • 30. 5. Super Computer The largest and fastest computers are the supercomputers specifically designed to process huge amounts of data. It is capable of processing trillions of instructions in a few seconds as it has thousands of processors interconnected. Roger Cray developed the first supercomputer in 1976 and since then it is only used for particular science and engineering applications. This includes weather forecasts, hospital equipment, nuclear research, etc.
  • 31. Application of Supercomputers - It enhances device protection as it can decrypt the passwords for security reasons. - Animation results are excellent on this computer. - Nuclear weapons and critical medical tests use them for virtual testing. - The National Oceanic and Atmospheric Administration uses it for climate patterns and weather conditions. - Designs flight simulators for beginner pilots for training. - Online currency like bitcoin and stocks are largely managed by this computer only. - Diagnosis of some critical health issues like brain injuries and strokes is done by this computer. - It accurately analyses scientific data and explores the solar system and earth movement. - It can identify the level of pollutants present in the atmosphere at a particular point in time.
  • 32. Application of IT in Business
  • 33. Application of IT in Business 1. Product development – CAD, CAM, CAE(simulation and testing) 2. Marketing – Text, images, videos, digital marketing 3. Research – R&D, patents, trademarks 4. Data tracking and Storage – MIS team, Data mining, analytics using R, Python 5. Human Resource Management – Workday, SAP SuccessFactors, Oracle HRMS 6. Finance – SAP, Oracle, for small business Tally 7. Sales & Distribution – Salesforce, Botree 8. Supply Chain Management – Oracle, SAP
  • 36. 1. Input unit is the platform from where the raw data is passed into the computer system. The input can be in any form. For example, the mouse- clicked input, button-input, keyboard-input, etc. All the input data is passed from the input unit to the computer’s storage unit.
  • 37. 2. CPU - The CPU is the primary component that processes the input passed into the computer. It is also called the heart or brain of the computer. The CPU has two components Arithmetic Logical Unit (ALU) and Control Unit (CU).
  • 38. Components of a CPU Arithmetic Logical Unit (ALU) is the digital circuit that takes these 0s and 1s and performs the necessary arithmetic operations on it and releases the results as the output Control Unit (CU) is like the traffic guy. It controls the instructions flowing in and out of the CPU. The CU is smart enough to sense that when the CPU’s central processor needs data and when not. If the data is required then it retrieves it from the Storage Unit and transfers it into the CPU. The CU converts the data into signals and passes it into the central processor. Storage Unit Raw data from the Input unit is saved in the Storage Unit. It is the place where the data that is to be processed and processed data is stored. The Storage Unit is further classified into two parts. • Primary Storage – RAM/ROM • Secondary Storage – Hard disk
  • 39. 3. Output unit is the place through which the computer system outputs the data. The output unit is always hardware. The computer screen, speakers, printer, etc. are the output devices because from these devices users get their processed data.
  • 41. Introduction  The advent of computer and communication technology have changed our daily life. Observe the following daily life examples-  Watching Cable TV  Cash Withdrawal from ATM  Sending  Booking  Sending  These services interconnected and receiving E-mails Railway or Air-lines Tickets. and receiving SMS through Mobile. are provided by the collection of communicating devices like computers, which make Communication Network.  The communication over network are possible through transfer of text/picture/audio/video data through wire or wireless transmission medium.
  • 42. What is a Network?  In as “A simplest terms, the network can be defined – computer network consists of two or more connected autonomous computers.”
  • 43. Why we build a Network? Sharing Resources: Primary use of network is to share data and peripherals among users irrespective of their physical location.  Ex. Sharing database, program files, audio and video files, printer and scanners etc. Improved Communication: A computer network enables reliable, secure and faster  communication between users. It saves our time and offers easy communication methods. Ex. e-mail, SMS and MMS etc. Reduced Communication cost: Sharing resources also reduces its communication  cost. large Using today’s public network we can send a quantity network of data at very very low cost. Internet and Mobile playing a important role in sending and receiving text, image, audio and video data.
  • 44. Components of a Network Sender: A device or a computer that sends the data. Receiver: A device or a computer that receives the data. Message: Information to be communicated. It may be text, images, sound or video. Medium: A transmission medium is a physical path through which the data flows from sender to receiver. A cable, fiber-optics or radio waves can be the medium. Protocol: A set of rules that govern data communication. It represents an agreement between the communicating devices.     
  • 45. Networking Devices  Networking devices are equipments that allow receive or transmit data or signal and used make communication channel. to  Some common  Modem  Hub  Switch  Router  Bridge  Gateway  Repeater Networking devices are-
  • 46. 1. MODEM A MODEM (MOdulator-DEModulator) is a device that  connect Telephone line to Computer. It converts Digital signal into Analog (Modulation) and Analog to Digital (Demodulation). This conversion is required because Telephone lines can’t carry digital data  Generally it is used to connect a PC with Telephone  lines to access Internet or make voice call and FAX using PC. It may Internal or External type. Now days DSL Modem is used to access Broadband Internet. 
  • 47. 2. Hub & Repeater  A Hub or Concentrator is a connecting device which connects multiple computers together to form a LAN.  It provides various RJ-45 ports to connect Twisted Pair cable in STAR topology and making them act as a single network segment.  Hubs make Broadcast type Network and do not manage traffic that comes through them. Signal entering any port is broadcast out on all other ports.  Type of Hub  Active Hub: Amplify the signal works when required and as a Repeater.  Passive Hub: It simply passes the signal without any change.
  • 48. 3. Bridges  Bridges are used to connect two LAN or two segment of the same LAN or divide a large network into smaller segments. Connecting LANs must have the same Protocol.  Unlike repeaters, bridges contain logic that allows them to keep traffic for each segment separate. This way bridges provide some security to the individual segments.  When a data frame enters a bridge, it not only regenerates the signal but also checks its destination and forwards only to the segment to which the address belongs.
  • 49. 4. Switch Switch is a device that is used to segment network into different Sub-networks (Subnet) to control the network traffic. It provides bridging functionality with greater efficiency. It is responsible for filtering data in a specific way and for forwarding packets between LAN segments. A switch has a buffer that stores the packets from the sender and checks the address to find out the outgoing link. If the outgoing link is free the switch sends the packet to the particular link. Modern day switches are equipped with Router functionalities and offers faster throughput than Hubs.    
  • 50. 5. Router Router is a networking device which connect multiple Networks irrespective of their Protocols. Routers works at IP Address where as Bridge works at MAC address. Routers have the intelligence to determine the best possible route for data packets to travel. There are a number of routers present in large network to aid in speedy delivery of data packets. Router maintains a table of addresses (called routing table) that keeps a track of delivery paths of data packets.    
  • 51. 6. Gateways A Gateway is a device that connects dissimilar networks. It establishes connection between LAN and External Network with different structure. A Gateway is a protocol converter that connects two dissimilar networks having different protocols i.e. It can accept a packet formatted for one protocol (e.g. AppleTalk) and convert it to a packet formatted for another protocol (e.g. TCP/IP) before forwarding it. A gateway can be implemented in hardware, software or both, but they are usually implemented by software installed within a router. A LAN gets connected to Internet (WAN) using a gateway.    
  • 52. Networking • Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually, the connections between computers in a network are made using physical wires or cables However, some connections are wireless, using radio waves or infrared signals 15-52
  • 53. Networking • The generic term node or host refers to any device on a network • Data transfer rate The speed with which data is moved from one place on a network to another • Data transfer rate is a key issue in computer networks 15-53
  • 54. Networking • Computer networks have opened up an entire frontier in the world of computing called the client/server model 15-54 Figure 15.1 Client/Server interaction
  • 55. Networking • File server A computer that stores and manages files for multiple users on a network • Web server A computer dedicated to responding to requests (from the browser client) for web pages 15-55
  • 56. Types of Networks • Local-area network (LAN) A network that connects a relatively small number of machines in a relatively close geographical area 15-56
  • 57. Types of Networks • Various configurations, called topologies, have been used to administer LANs • Ring topology A configuration that connects all nodes in a closed loop on which messages travel in one direction • Star topology A configuration that centers around one node to which all others are connected and through which all messages are sent • Bus topology All nodes are connected to a single communication line that carries messages in both directions 15-57
  • 58. Types of Networks • A bus technology called Ethernet has become the industry standard for local-area networks Figure 15.2 Various network topologies 15-10
  • 59. Types of Networks • Wide-area network (WAN) A network that connects two or more local-area networks over a potentially large geographic distance Often one particular node on a LAN is set up to serve as a gateway to handle all communication going between that LAN and other networks Communication between networks is called internetworking The Internet, as we know it today, is essentially the ultimate wide-area network, spanning the entire globe 15-59
  • 60. Types of Networks • Metropolitan-area network (MAN) The communication infrastructures that have been developed in and around large cities 15-60
  • 61. So, who owns the Internet? Well, nobody does. No single person or company owns the Internet or even controls it entirely. As a wide-area network, it is made up of many smaller networks. These smaller networks are often owned and managed by a person or organization. The Internet, then, is really defined by how connections can be made between these networks. 15-61
  • 62. Types of Networks 15-62 Figure 15.1 Local-area networks connected across a distance to create a wide-area network
  • 63. Internet Connections • Internet backbone A set of high-speed networks that carry Internet traffic These networks are provided by companies such as AT&T, GTE, and IBM • Internet service provider (ISP) A company that provides other companies or individuals with access to the Internet 15-63
  • 64. Internet Connections • There are various technologies available that you can use to connect a home computer to the Internet • A phone modem converts computer data into an analog audio signal for transfer over a telephone line, and then a modem at the destination converts it back again into data • A digital subscriber line (DSL) uses regular copper phone lines to transfer digital data to and from the phone company’s central office • A cable modem uses the same line that your cable TV signals come in on to transfer the data back and forth 15-64
  • 65. Internet Connections • Broadband A connection in which transfer speeds are faster than 128 bits per second • DSL connections and cable modems are broadband connections • The speed for downloads (getting data from the Internet to your home computer) may not be the same as uploads (sending data from your home computer to the Internet) 15-65
  • 66. Packet Switching • To improve the efficiency of transferring information over a shared communication line, messages are divided into fixed- sized, numbered packets • Network devices called routers are used to direct packets between networks Figure 15.4 Messages sent by packet switching 15-18
  • 67. Open Systems • Proprietary system A system that uses technologies kept private by a particular commercial vendor One system couldn’t communicate with another, leading to the need for • Interoperability The ability of software and hardware on multiple machines and from multiple commercial vendors to communicate Leading to • Open systems Systems based on a common model of network architecture and a suite of protocols used in its implementation 15-67
  • 68. Open Systems • The International Organization for Standardization (ISO) established the Open Systems Interconnection (OSI) Reference Model • Each layer deals with a particular aspect of network communication 15-68 Figure 15.5 The layers of the OSI Reference Model
  • 69. Network Protocols • Network protocols are layered such that each one relies on the protocols that underlie it • Sometimes referred to as a protocol stack 15-69 Figure 15.6 Layering of key network protocols
  • 70. TCP/IP • TCP stands for Transmission Control Protocol TCP software breaks messages into packets, hands them off to the IP software for delivery, and then orders and reassembles the packets at their destination • IP stands for Internet Protocol IP software deals with the routing of packets through the maze of interconnected networks to their final destination 15-70
  • 71. TCP/IP (cont.) • UDP stands for User Datagram Protocol • It is an alternative to TCP • The main difference is that TCP is highly reliable, at the cost of decreased performance, while UDP is less reliable, but generally faster 15-71
  • 72. High-Level Protocols • Other protocols build on the foundation established by the TCP/IP protocol suite • Simple Mail Transfer Protocol (SMTP) • File Transfer Protocol (FTP) • Telnet • Hyper Text Transfer Protocol (http) 15-72
  • 73. MIME Types • Related to the idea of network protocols and standardization is the concept of a file’s MIME type • MIME stands for Multipurpose Internet Mail Extension • Based on a document’s MIME type, an application program can decide how to deal with the data it is given 15-73
  • 74. MIME Types 15-74 Figure 15.7 Some protocols and the ports they use
  • 75. Firewalls • Firewall A machine and its software that serve as a special gateway to a network, protecting it from inappropriate access • Filters the network traffic that comes in, checking the validity of the messages as much as possible and perhaps denying some messages altogether • Enforces an organization’s access control policy 15-75
  • 76. Firewalls 15-76 Figure 15.8 A firewall protecting a LAN
  • 77. Network Addresses • Hostname A unique identification that specifies a particular computer on the Internet For example matisse.csc.villanova.edu condor.develocorp.com 15-77
  • 78. Network Addresses • Network software translates a hostname into its corresponding IP address For example 205.39.145.18 15-78
  • 79. Network Addresses • An IP address can be split into • network address, which specifies a specific network • host number, which specifies a particular machine in that network 15-79 Figure 15.9 An IP address is stored in four bytes
  • 80. Domain Name System • A hostname consists of the computer name followed by the domain name • csc.villanova.edu is the domain name • A domain name is separated into two or more sections that specify the organization, and possibly a subset of an organization, of which the computer is a part • Two organizations can have a computer named the same thing because the domain name makes it clear which one is being referred to 15-80
  • 81. Domain Name System • The very last section of the domain is called its top- level domain (TLD) name 15-81 Figure 15.10 Top-level domains, including some relatively new ones
  • 82. Domain Name System • Organizations based in countries other than the United States use a top-level domain that corresponds to their two-letter country codes 15-82 Figure 15.11 Some of the top-level domain names based on country codes
  • 83. Domain Name System • The domain name system (DNS) is chiefly used to translate hostnames into numeric IP addresses • DNS is an example of a distributed database • If that server can resolve the hostname, it does so • If not, that server asks another domain name server 15-83
  • 85. Table Contents • Virus • What does a computer virus do? • How does a computer get a virus? • Symptoms of computer virus • Examples of a computer virus • Computer Virus Protection • Antivirus • Common AntiVirus • How AntiVirus Works? • Conclusion 85
  • 86. Virus – A computer virus is a program which can harm our device and files and infect them for no further use. When a virus program is executed, it replicates itself by modifying other computer programs and instead enters its own coding. This code infects a file or program and if it spreads massively, it may ultimately result in crashing of the device. – Across the world, Computer viruses are a great issue of concern as they can cause billions of dollars’ worth harm to the economy each year. 86
  • 88. • Some computer viruses are programmed to harm your computer by damaging programs, deleting files, or reformatting the hard drive. Others simply replicate themselves or flood a network with traffic, making it impossible to perform any internet activity. • Even less harmful computer viruses can significantly disrupt your system’s performance, sapping computer memory and causing frequent computer crashes. ●●● 88 What does a computer virus do?
  • 89. • In 2013, the botnet virus Gameover ZueS was discovered to use peer-to-peer downloading sites to distribute ransomware and commit banking fraud. • While tens of thousands of computer viruses still roam the internet, they have diversified their methods and are now joined by a number of malware variants like worms, Trojans, and ransomware. 89 What does a computer virus do?
  • 90. • Sharing music, files, or photos with other users • Visiting an infected website • Opening spam email or an email attachment • Downloading free games, toolbars, media players and other system utilities • Installing mainstream software applications without thoroughly reading license agreements 90 How does a computer get a virus?
  • 91. Symptoms of a computer virus • Slow computer performance • Erratic computer behavior • Unexplained data loss • Frequent computer crashes 91
  • 92. Examples of computer viruses •Worms - A worm is a type of virus that, unlike traditional viruses, usually does not require the action of a user to spread from device to device. •Trojans - As in the myth, a Trojan is a virus that hides within a legitimate-seeming program to spread itself across networks or devices. •Ransomware - Ransomware is a type of malware that encrypts a user’s files and demands a ransom for its return. Ransomware can be, but isn’t necessarily, spread through computer viruses. ●●● 92
  • 93. Computer virus protection •Use antivirus protection and a firewall •Get antispyware software •Always keep your antivirus protection and antispyware software up-to-date •Update your operating system regularly •Increase your browser security settings ●●● 93
  • 94. Computer virus protection •Avoid questionable Websites •Only download software from sites you trust. •Carefully evaluate free software and file-sharing applications before downloading them. •Don't open messages from unknown senders •Immediately delete messages you suspect to be spam 94
  • 95. AntiVirus – An anti-virus is a software which comprises programs or set of programs which can detect and remove all the harmful and malicious software from your device. – This anti-virus software is designed in a manner that they can search through the files in a computer and determine the files which are heavy or mildly infected by a virus. 95
  • 96. Common AntiVirus • Norton Antivirus • F-Secure Antivirus • Kaspersky Antivirus • AVAST Antivirus • Comodo Antivirus • McAfee Antivirus ●●● 96
  • 98. How does an Anti-Virus works? • Once the file is quarantined, the application can attempt to repair it, delete it, or prompt you for a decision on what to do about the file infected. • This approach helps protect against unidentified or encrypted viruses and can alert you to suspicious behavior happening on your computer. • This interesting is an area where anti-spyware/anti-adware and anti-virus software often notice the same kinds of activities, because they are typical for adware and spyware as well as malware 98
  • 99. Conclusion •Computer virus is a software program written with malicious intentions. There are number of computer viruses that can impede the functioning of your computer system. •They are replicated by themselves. Viruses are so dangerous and malicious that they can be automatically copied and pasted from memory to memory over and over; the transmitting power is too much quick from network to network that can simply hang smoothly running 99
  • 100. References • Google.com • Wikipedia.org • Studymafia.org • Slidespanda.com
  • 101. • (2) Word: Getting Started - YouTube
  • 102. • (2) Word: Creating and Opening Documents - YouTube
  • 103. (2) Word: Saving and Sharing Documents - YouTube
  • 104. • (2) Word: Text Basics - YouTube
  • 105. • (14) Mail Merge in MS Word|step by step process|how to create Mail Marge document in ms word - YouTube